Database quiesce operations
A technique to quiesce a database without causing after-arriving access requests to abnormally terminate interrogates database management system control structures associated with the database. Specified modifications to these control structures can be made so that subsequent access requests to the database (i.e., during quiesce operations) are not abnormally terminated. Once quiesced, regular or special purpose maintenance or testing operations, the starting or stopping of log keeping operations or similar operations may be made to the database. Once these are complete, the database control structures may be updated again to permit pending/scheduled access requests to proceed.
Latest BMC Software, Inc. Patents:
The invention relates generally to database and database management system operations. More specifically, the invention relates to moving a hierarchical database to a quiesce point without causing applications attempting to access the database during the quiesce operation to fail.
Referring to
During normal database operations, it is often useful or necessary to quiesce a database. For example, a utility application (e.g., application A1 in DBMS 110) may want to start or stop log keeping operations or initiate a backup operation against database 105. One of ordinary skill in the art will recognize that these, and similar operations, require forcing database 105 to a quiesce point. As used herein, a “quiesce point” is a point-in-time when there are no incomplete transactions in process against a database and when all database information has been “hardened” (i.e., committed to permanent storage). Accordingly, to “quiesce a database” means to force the database to a quiesce point.
Referring to
Once new access operations to database 105 are stopped, DBMS 210 waits for all in-flight transactions against database 105 to complete (225) and then closes (230) and deallocates (235) database 105. As part of deallocation operation 235, database 105 has any working memory resident data hardened or written to permanent storage (e.g., one or more direct access storage devices). In many environments, database management systems do not provide a positive acknowledgement that a commanded task has completed. It is common, therefore, for requesting utility 205 to periodically query DBMS 210 to determine when prior issued STOP command 215 has completed (240). After deallocation process 235 has completed, and in response to such a query, DONE message 245 may be transmitted by DBMS 210 to utility 205. Requesting utility 205 may now perform (or have performed) the task for which STOP command 215 was issued (250). For example, utility 205 may start or stop logging operations against database 105. Once task 250 is complete, utility 205 may issue IMS START command 255 to DBMS 210 targeting database 105. In response, DBMS 210 allocates (260) and opens (265) database 105. Following completion of OPEN command 265, DBMS 210 permits access to database 105 (270). As before, utility 205 may periodically query DBMS 210 to determine when START operation 255 has completed (275), DBMS 210 issuing DONE message 280 when appropriate.
As illustrated, prior art quiesce technique 200 causes periods of database outage—times during which applications attempting to access the database being quiesced fail. For a business, each such failure can lead to the direct loss of business. Thus, it would be beneficial to provide a means to quiesce a database without causing applications attempting to access the database to fail.
SUMMARYIn one embodiment the invention provides a method to quiesce a database. The method includes identifying a target database and modifying one or more control parameters associated with the target database—the modification causing after-arriving access requests for the target database to be scheduled for execution at a later time rather than being abnormally terminated. After in-flight transactions pending against the target database are permitted to complete, any action against the target database may be safely taken. Illustrative actions include, but are not limited to, regular or special purpose maintenance or testing operations and the starting or stopping of log keeping operations. Once these actions are complete, the target database's data in buffer memory may be written to permanent storage and, thereafter, made available for continued access. That is, scheduled and newly arriving access requests are permitted to execute against the target database.
In another embodiment, the invention provides a plurality of computer systems communicatively coupled via a network where, cooperatively, the computer systems perform the acts outlined above. In still another embodiment, a computer executable program to implement the above-outlined method may be stored in any media that is readable and executable by a programmable control device (e.g., a computer processor).
In general, the invention relates to database management operations. More particularly, the invention relates to database quiesce operations in which applications attempting to access the database during the quiesce operation do not fail.
The following description is presented to enable any person skilled in the art to make and use the invention as claimed and is provided in the context of the particular examples discussed below, variations of which will be readily apparent to those skilled in the art. In the interest of clarity, not all features of an actual implementation are described in this specification. It will be appreciated that in the development of any such actual implementation numerous decisions must be made to achieve the developers' specific goals (e.g., compliance with system- and business-related constraints), and that these goals will vary from one implementation to another. It will also be appreciated that such development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the database management and utility design field having the benefit of this disclosure. Accordingly, the claims appended hereto are not intended to be limited by the disclosed embodiments, but are to be accorded their widest scope consistent with the principles and features disclosed herein.
For illustrative purposes only, a quiesce operation in accordance with the invention will be described in the context of a hierarchical database environment. One widely known hierarchical database is the Information Management System (IMS) database from the International Business Machines (IBM) corporation. It will be recognized that IMS database systems typically operate in a mainframe computer system environment. As a consequence, IMS databases are typically part of an enterprise computing system.
Referring to
It will be recognized that DBMS systems are released with a given set of capabilities (i.e., commands that they recognize and can process). It is possible to extend the capabilities of an existing DBMS through a command processor. As used herein, a “command processor” is an entity that accepts commands unknown to an existing DBMS, and implements the command through a series of operations and/or commands to an existing DBMS that it can understand. Command processors may be implemented in software (i.e., as a sequence of computer executable instructions) or a combination of software and hardware.
Referring to
Referring to
On completion of modifying database 315's control structures in DBMS 325, command processor 400 issues STATUS message 525 to notify utility 505 whether there are any in-flight transactions against database 315. If there are transactions pending against database 315, command processor waits for them to complete (530). In one embodiment, utility 505 may periodically query command processor 400 to determine when in-flight transactions have completed (535). Similarly, command processor 400 may periodically interrogate DBMS 325 to determine if DBMS 315's in-flight transactions have completed (not shown). In another embodiment, utility 505 may wait a designated period of time before proceeding with quiesce operation 500. In still another embodiment, DBMS 325 may be configured to sua sponte provide notification when in-flight transactions have completed. However obtained, command processor 400 notifies utility 505 when all in-flight transactions have completed (540). (It is noted, if no in-flight transactions are identified following acts in accordance with operation 515, status message 525 may so indicate and operations 535 and 540 may be omitted.)
Once there are no outstanding transactions against database 315, utility 505 may perform whatever task(s) motivated the quiesce (545). The types of tasks that may be performed include, but are not limited to, regular or special purpose maintenance or testing operations and the starting or stopping of log keeping operations. When task 545 has completed, utility 505 may issue UNPAUSE command 550. On receipt of same, command processor 400 issues IMS START command 555 to DBMS 325 which, in turn, issues IMS CLOSE command 560 followed by IMS START command 565. One of ordinary skill in the art will recognize that one consequence of executing an IMS CLOSE command is that the targeted database's associated memory buffers are flushed. Thus, when DBMS 325 issues CLOSE command 560, data in working memory for database 315 is written to permanent storage, i.e., “hardened.” Once closed, database 315 may be immediately reopened and, once this is done, all those access operations pending on database 315 may begin executing (570). Similar to operations 535 and 540, utility 505 may query command processor 400 to determine when the submitted UNPAUSE command has completed (575 and 580).
With respect to
Once identified, those DDIR control block associated with target database 315 may be modified so as to cause DBMS 325 to schedule access requests targeting database 315 (block 605). Through the novel and in-depth investigation and testing of IMS DDIR structures, it has been determined that a specific bit may be manipulated in such a way to cause DBMS 325 to schedule received access requests rather than terminating them (i.e., issuing an ABEND). In the IMS database sold by IBM, this feature may be effected by setting bit DDIRSTSC in byte field DDIRCOD3 of a DDIR control block.
Once DDIR control blocks associated with target database 315 have been so modified, a further check of DBMS control blocks may be made to determine if there are any in-flight transactions against database 315 (block 610). If there are no open, pending or in-flight transactions (the “NO” prong of block 610), command processor 400 issues “CLEAR” status message 525 to utility application 505 indicating there are no pending transactions for database 315 (block 615). If there are pending or in-flight transactions (the “YES” prong of block 610), command processor 400 issues “BUSY” status message 525 to utility application 505 indicating there are pending transactions against database 315 (block 620).
Referring to
Operations in accordance with
With respect to UNPAUSE command 550, in one embodiment command processor 400 issues a database start command against database 315. In an IMS DBMS, for example, the START command automatically generates CLOSE command 560 which causes all buffers associated with database 315 to be flushed and the data hardened. Once closed, START command 555 places database 315 in a START STATUS 565—a consequence of which is that the data structures and control mechanisms adjusted during acts in accordance with 515 are cleared. In the current example, when database 315 is placed into a START STATUS, the DDIRSTSC bit in the DDIRCOD3 byte field is automatically cleared. In other embodiments, however, it may be necessary for command processor 400 to reset that mechanism invoked in accordance with 515. As a result of the DDIRSTSC bit being cleared, pending/scheduled access requests are permitted to run. Once in START STATUS, command processor 400 will respond to status inquiry (575) during acts in accordance with 580 in a manner similar to that described in accordance with 535 and 540. In an IMS database environment, it will be understood that a database in the START STATUS will be opened (i.e., have its data sets opened and made available) once it receives a first access request against the target database.
It will be recognized by those one of ordinary skill in the art that while the database quiesce operation described herein was directed toward an IMS database, it is equally applicable to other databases that use DBMS management data structures to track and control access to individually open databases. It will be understood that the particulars of operations in accordance with
Comparison of
Various changes in the materials and components as well as in the details of the illustrated operational methods are possible without departing from the scope of the following claims. For instance, in the illustrative operation of
Finally, it will be recognized that acts in accordance with
Claims
1. A method including executing instructions recorded on a non-transitory computer-readable storage media using at least one processor, the method comprising:
- receiving a command to quiesce a target database;
- identifying the target database;
- modifying a control parameter for the target database at a first time in response to receiving the command;
- scheduling one or more access requests for the target database received after the first time to execute at a later time, wherein the modified control parameter causes the scheduling of the one or more access requests after receiving the command to quiesce the target database;
- allowing one or more in-flight transactions for the target database that are incomplete at the first time to complete, the time at which the one or more in-flight transactions complete being a second time;
- writing data for the target database to permanent storage at a third time, the third time being after the second time;
- modifying the control parameter for the target database at a fourth time; and
- executing the one or more scheduled access requests, wherein the modified control parameter causes the execution of the one or more scheduled access requests after the fourth time.
2. The method of claim 1, wherein the target database comprises a hierarchical database.
3. The method of claim 2, wherein the hierarchical database comprises an Information Management System (IMS) database.
4. The method of claim 3, wherein modifying the control parameter at a first time comprises modifying a specified byte field in a DDIR control block and modifying the control parameter at a fourth time comprises modifying the specified byte field in the DDIR control block.
5. The method of claim 4, wherein writing data for the target database to permanent storage comprises performing a database CLOSE operation against the target database.
6. The method of claim 5, wherein modifying the control parameter for the target database at a fourth time comprises placing the target database in an OPEN status.
7. The method of claim 1, wherein modifying the control parameter at a first time comprises modifying more than one control parameter for the target database and modifying the control parameter at a fourth time comprises modifying more than one control parameter for the target database.
8. The method of claim 1, further comprising performing a task against the target database after the third time and before the fourth time.
9. The method of claim 1, wherein allowing one or more in-flight transactions comprises:
- identifying one or more incomplete in-flight transactions for the target database; and
- subsequently periodically attempting to identify in-flight transactions for the target database, stopping when no incomplete in-flight transactions are identified.
10. A non-transitory computer-readable storage medium storing instructions that when executed cause a processor to perform a process, the instructions comprising instructions to:
- receive a command to quiesce a target database;
- identify the target database;
- modify a control parameter for the target database at a first time in response to receiving the command;
- schedule one or more access requests for the target database received after the first time to execute at a later time, wherein the modified control parameter causes the scheduling of the one or more access requests after receiving the command to quiesce the target database;
- allow one or more in-flight transactions for the target database that are incomplete at the first time to complete, the time at which the one or more in-flight transactions complete being a second time;
- write data for the target database to permanent storage at a third time, the third time being after the second time;
- modify the control parameter for the target database at a fourth time; and
- execute the one or more scheduled access requests, wherein the modified control parameter causes the execution of the one or more scheduled access requests after the fourth time.
11. The non-transitory computer-readable storage medium of claim 10, wherein the target database comprises a hierarchical database.
12. The non-transitory computer-readable storage medium of claim 11, wherein the hierarchical database comprises an Information Management System (IMS) database.
13. The non-transitory computer-readable storage medium of claim 12, wherein:
- the instructions to modify the control parameter at a first time comprise instructions to modify a specified byte field in a DDIR control block; and
- the instructions to modify the control parameter at a fourth time comprise instructions to modify the specified byte field in the DDIR control block.
14. A computer system, comprising:
- memory; and
- one or more programmable control devices, at least one of which is communicatively coupled to the memory, the memory having stored therein instructions for causing the one or more programmable control devices to:
- receive a command to quiesce a target database;
- identify the target database;
- modify a control parameter for the target database at a first time in response to receiving the command;
- schedule one or more access requests for the target database received after the first time to execute at a later time, wherein the modified control parameter causes the scheduling of the one or more access requests after receiving the command to quiesce the target database;
- allow one or more in-flight transactions for the target database that are incomplete at the first time to complete, the time at which the one or more in-flight transactions complete being a second time;
- write data for the target database to permanent storage at a third time, the third time being after the second time;
- modify the control parameter for the target database at a fourth time; and
- execute the one or more scheduled access requests, wherein the modified control parameter causes the execution of the one or more scheduled access requests after the fourth time.
15. The computer system of claim 14, wherein the target database comprises a hierarchical database.
16. The computer system of claim 15, wherein the hierarchical database comprises an Information Management System (IMS) database.
17. The computer system of claim 16, wherein:
- the instructions for causing the one or more programmable control devices to modify the control parameter at a first time comprise instructions for causing the one or more programmable control devices to modify a specified byte field in a DDIR control block; and
- the instructions for causing the one or more programmable control devices to modify the control parameter at a fourth time comprise instructions for causing the one or more programmable control devices to modify the specified byte field in the DDIR control block.
5495606 | February 27, 1996 | Borden et al. |
5890165 | March 30, 1999 | Boudrie et al. |
6202071 | March 13, 2001 | Keene |
6453325 | September 17, 2002 | Cabrera et al. |
6609123 | August 19, 2003 | Cazemier et al. |
6957221 | October 18, 2005 | Hart et al. |
7051052 | May 23, 2006 | Shapiro et al. |
7200626 | April 3, 2007 | Hoang et al. |
7263537 | August 28, 2007 | Lin et al. |
7590688 | September 15, 2009 | Franke |
7657510 | February 2, 2010 | Silverbrook et al. |
20020169777 | November 14, 2002 | Balajel et al. |
20060020459 | January 26, 2006 | Carter et al. |
Type: Grant
Filed: Aug 28, 2009
Date of Patent: May 1, 2012
Patent Publication Number: 20110055181
Assignee: BMC Software, Inc. (Houston, TX)
Inventors: Bruce Mansur (Dripping Springs, TX), Gary Salazar (Houston, TX)
Primary Examiner: James Trujillo
Assistant Examiner: Thong Vu
Application Number: 12/550,083
International Classification: G06F 17/30 (20060101);